-
Another day, another trove of login credentials in plain text found online.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
For years, Google users have been stuck with the email addresses they created when they first signed up. If you picked an embarrassing username years ago or simply want a more professional handle, the only previous solution was to create a brand-new ac…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The Tycoon 2FA phishing kit represents one of the most sophisticated threats targeting enterprise environments today. This Phishing-as-a-Service (PhaaS) platform, which emerged in August 2023, has become a formidable adversary against organizational se…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A seemingly legitimate Zoom document share from “HR” redirected victims through a fake bot-protection gate into a Gmail login phish. User credentials are exfiltrated live via WebSocket and validated in real time. This report breaks down the social engi…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Researchers have discovered a critical zero-click vulnerability in ChatGPT’s Deep Research agent that allows attackers to silently steal sensitive Gmail data without any user interaction. This sophisticated attack leverages service…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Google has firmly rejected widespread reports suggesting it issued a global security alert to its 2.5 billion Gmail users, calling such claims “entirely false”. The tech giant moved swiftly to clarify the situation after viral headlines spa…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A sophisticated voice phishing operation has emerged as a significant threat to organizations worldwide, with cybercriminals successfully infiltrating Salesforce environments to steal sensitive data and demand ransom payments. Google’s Threat Int…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


